Sciweavers

2454 search results - page 328 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CSCW
2011
ACM
14 years 4 months ago
(Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context
This paper describes a qualitative study of how 11 Arab individuals use technology in the context of their longdistance romantic relationships. Our participants’ communication p...
Tamara Alsheikh, Jennifer A. Rode, Siân E. L...
DSS
2011
14 years 1 months ago
Estimating the effect of word of mouth on churn and cross-buying in the mobile phone market with Markov logic networks
Abstract: Much has been written about word of mouth and customer behavior. Telephone call detail records provide a novel way to understand the strength of the relationship between ...
Torsten Dierkes, Martin Bichler, Ramayya Krishnan
WWW
2008
ACM
15 years 11 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
CHI
2003
ACM
15 years 10 months ago
Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration
A tension exists between designers' comfort with physical artifacts and the need for effective remote collaboration: physical objects live in one place. Previous research and...
Katherine Everitt, Scott R. Klemmer, Robert Lee, J...
86
Voted
NOMS
2008
IEEE
120views Communications» more  NOMS 2008»
15 years 4 months ago
SGNET: Implementation insights
—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
Corrado Leita, Marc Dacier